You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
To prevent destruction interruptions, any resources that have been created outside of Terraform and attached to the resources provisioned by Terraform must be deleted before the module is destroyed.
51
+
To prevent destruction interruptions, any resources that have been created outside of Terraform and attached to the resources provisioned by Terraform must be deleted before the module is destroyed.
52
+
53
+
The private key generated by Keypair module will be stored in AWS Systems Manager Parameter Store. FOr more details refer [this](https://registry.terraform.io/modules/squareops/keypair/aws)
58
54
59
55
## Network Scenarios
60
56
@@ -70,7 +66,7 @@ This module supports three scenarios to create Network resource on AWS. Each wil
70
66
-`enable_public_subnet = true`
71
67
-`enable_private_subnet = true`
72
68
73
-
-**complete-vpc-with-vpn:** To create a VPC with public, private, database and intra subnets along with an IGW and NAT gateway. Jump server/Bastion Host is also configured.
69
+
-**complete-vpc-with-vpn:** To create a VPC with public, private, database and intra subnets along with an IGW and NAT gateway. Jump server/Bastion Host is also configured.
74
70
-`vpc_cidr = local.vpc_cidr`
75
71
-`enable_public_subnet = true`
76
72
-`enable_private_subnet = true`
@@ -94,32 +90,32 @@ The required IAM permissions to create resources from this module can be found [
94
90
95
91
To configure Pritunl VPN:
96
92
97
-
1. Access the Pritunl UI using the public IP of EC2 instance in browser
98
-
2. Get the initial key, user and password for setting up Pritunl from Secret Manager and log in to Pritunl.
93
+
1. Access the Pritunl UI over HTTPS using the public IP of EC2 instance in browser
94
+
2. Retrieve the initial key, user and password for setting up Pritunl from AWS Secrets Manager and log in to Pritunl.
99
95
3. Create a DNS record mapping to the EC2 instance's public IP
100
96
4. After login, in the Initial setup window, add the record created in the 'Lets Encrypt Domain' field.
101
97
5. Pritunl will automatically configure a signed SSL certificate from Lets Encrypt.
102
98
6. Add organization and user to pritunl.
103
99
7. Set server port as 10150 which is already allowed from security group while creating vpn.
104
100
8. Attach organization to the server and Start the server.
105
-
9. Copy or download user profile link or file.
101
+
9. Copy or download user profile link or file.
106
102
10. Import the profile in Pritunl client.
107
-
103
+
108
104
NOTE: Port 80 should be open publicly in the vpn security group to verify and renewing the domain certificate.
109
105
110
-
# CIS COMPLIANCE
106
+
# CIS COMPLIANCE
111
107
112
-
- Follows the VPC recommendations of CIS Amazon Web Services Foundations Benchmark v1.4.0
108
+
- Follows the VPC recommendations of CIS Amazon Web Services Foundations Benchmark v1.4.0
113
109
114
110
[ 5. NETWORKING ]
115
111
116
-
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote
112
+
5.1 Ensure no Network ACLs allow ingress from 0.0.0.0/0 to remote
117
113
server administration ports (Automated)
118
114
119
-
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote
115
+
5.2 Ensure no security groups allow ingress from 0.0.0.0/0 to remote
120
116
server administration ports (Automated)
121
117
122
-
5.3 Ensure the default security group of every VPC restricts all traffic
118
+
5.3 Ensure the default security group of every VPC restricts all traffic
123
119
(Automated)
124
120
125
121
@@ -135,7 +131,7 @@ server administration ports (Automated)
| <aname="input_azs"></a> [azs](#input\_azs)| List of Availability Zone to be used by VPC |`list(any)`|`[]`|no|
153
+
| <aname="input_azs"></a> [azs](#input\_azs)| List of Availability Zone to be used by VPC |`list(any)`|n/a|yes|
158
154
| <aname="input_database_subnet_cidrs"></a> [database\_subnet\_cidrs](#input\_database\_subnet\_cidrs)| Database Tier subnet CIDRs to be created |`list(any)`|`[]`| no |
159
155
| <aname="input_default_network_acl_ingress"></a> [default\_network\_acl\_ingress](#input\_default\_network\_acl\_ingress)| List of maps of ingress rules to set on the Default Network ACL |`list(map(string))`| <pre>[<br> {<br> "action": "deny",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 22,<br> "protocol": "tcp",<br> "rule_no": 98,<br> "to_port": 22<br> },<br> {<br> "action": "deny",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 3389,<br> "protocol": "tcp",<br> "rule_no": 99,<br> "to_port": 3389<br> },<br> {<br> "action": "allow",<br> "cidr_block": "0.0.0.0/0",<br> "from_port": 0,<br> "protocol": "-1",<br> "rule_no": 100,<br> "to_port": 0<br> },<br> {<br> "action": "allow",<br> "from_port": 0,<br> "ipv6_cidr_block": "::/0",<br> "protocol": "-1",<br> "rule_no": 101,<br> "to_port": 0<br> }<br>]</pre> | no |
160
156
| <aname="input_enable_database_subnet"></a> [enable\_database\_subnet](#input\_enable\_database\_subnet)| Set true to enable database subnets |`bool`|`false`| no |
@@ -170,7 +166,6 @@ server administration ports (Automated)
170
166
| <aname="input_one_nat_gateway_per_az"></a> [one\_nat\_gateway\_per\_az](#input\_one\_nat\_gateway\_per\_az)| Set to true if a NAT Gateway is required per availability zone for Private Subnet Tier |`bool`|`false`| no |
171
167
| <aname="input_private_subnet_cidrs"></a> [private\_subnet\_cidrs](#input\_private\_subnet\_cidrs)| A list of private subnets CIDR to be created inside the VPC |`list(any)`|`[]`| no |
172
168
| <aname="input_public_subnet_cidrs"></a> [public\_subnet\_cidrs](#input\_public\_subnet\_cidrs)| A list of public subnets CIDR to be created inside the VPC |`list(any)`|`[]`| no |
173
-
| <aname="input_region"></a> [region](#input\_region)| Specify the region in which VPC will be created |`string`|`"us-east-1"`| no |
174
169
| <aname="input_vpc_cidr"></a> [vpc\_cidr](#input\_vpc\_cidr)| The CIDR block of the VPC |`string`|`"10.0.0.0/16"`| no |
175
170
| <aname="input_vpn_key_pair"></a> [vpn\_key\_pair](#input\_vpn\_key\_pair)| Specify the name of AWS Keypair to be used for VPN Server |`string`|`""`| no |
176
171
| <aname="input_vpn_server_enabled"></a> [vpn\_server\_enabled](#input\_vpn\_server\_enabled)| Set to true if you want to deploy VPN Gateway resource and attach it to the VPC |`bool`|`false`| no |
@@ -181,15 +176,11 @@ server administration ports (Automated)
181
176
| Name | Description |
182
177
|------|-------------|
183
178
| <aname="output_database_subnets"></a> [database\_subnets](#output\_database\_subnets)| List of IDs of database subnets |
0 commit comments